CVE-2024-40993

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: ipset: Fix suspicious rcu_dereference_protected()<br /> <br /> When destroying all sets, we are either in pernet exit phase or<br /> are executing a "destroy all sets command" from userspace. The latter<br /> was taken into account in ip_set_dereference() (nfnetlink mutex is held),<br /> but the former was not. The patch adds the required check to<br /> rcu_dereference_protected() in ip_set_dereference().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6.35:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*